Analysis
-
max time kernel
22s -
max time network
30s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-es -
resource tags
arch:x64arch:x86image:win10v2004-20240226-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
08/04/2024, 14:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gestion-procuradoraexternadgr-dot-yamm-track.appspot.com/2gScsRe96d72W6H6rWhRuHrem8ywOPWiKjYnwn6gjpX2NVBW-jgE0KOcL3l1f67kPCT0DvFnSTIO8nOcDORhG4za-aD2hJH54Lp5uu_3PeyQ3Z51HfH05CoMCi0zzZMBXdpu49_uFivC3QHKY_VNnYGjDfIMRF60uHjCPNx85PuHcMLYDr6JmQusl8obKeL01-z49gJmqDjaPaAVvy2cHYP3Qot4HjwL2-tHDPzS4-JSv-uCxtK4OHNLYKlQBfhnyk2v36ZKr3UP89Prcqmn6AXS2ak8IiXBTmaxHMHLsUPvtklRcOa0o6mqcCxPhyAAmdEM3CyZVP5g-9sdqF7mTopHcYfDBIgKxxQS8fnS3HSRBQNX8w-2H4dL6lN2Vp4q2MjPQ5_92aE8BRGjJ8QWNYyQJ79KOaKW95JjRqVoimSMbRA4zYk9c5DfJAVX0Gb_BJEIfwwXNI0SirY-qaXSkbb4ynfGhFlNGcKc_ARdbtxpRDr4uRkwawpP-81ER-72rviwYeYLivpyawu-TYlCdLqI7d-9XE0zd0Q
Resource
win10v2004-20240226-es
General
-
Target
https://gestion-procuradoraexternadgr-dot-yamm-track.appspot.com/2gScsRe96d72W6H6rWhRuHrem8ywOPWiKjYnwn6gjpX2NVBW-jgE0KOcL3l1f67kPCT0DvFnSTIO8nOcDORhG4za-aD2hJH54Lp5uu_3PeyQ3Z51HfH05CoMCi0zzZMBXdpu49_uFivC3QHKY_VNnYGjDfIMRF60uHjCPNx85PuHcMLYDr6JmQusl8obKeL01-z49gJmqDjaPaAVvy2cHYP3Qot4HjwL2-tHDPzS4-JSv-uCxtK4OHNLYKlQBfhnyk2v36ZKr3UP89Prcqmn6AXS2ak8IiXBTmaxHMHLsUPvtklRcOa0o6mqcCxPhyAAmdEM3CyZVP5g-9sdqF7mTopHcYfDBIgKxxQS8fnS3HSRBQNX8w-2H4dL6lN2Vp4q2MjPQ5_92aE8BRGjJ8QWNYyQJ79KOaKW95JjRqVoimSMbRA4zYk9c5DfJAVX0Gb_BJEIfwwXNI0SirY-qaXSkbb4ynfGhFlNGcKc_ARdbtxpRDr4uRkwawpP-81ER-72rviwYeYLivpyawu-TYlCdLqI7d-9XE0zd0Q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133570603732243744" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3624 chrome.exe 3624 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3624 wrote to memory of 1456 3624 chrome.exe 86 PID 3624 wrote to memory of 1456 3624 chrome.exe 86 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 4976 3624 chrome.exe 88 PID 3624 wrote to memory of 3140 3624 chrome.exe 89 PID 3624 wrote to memory of 3140 3624 chrome.exe 89 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90 PID 3624 wrote to memory of 2860 3624 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gestion-procuradoraexternadgr-dot-yamm-track.appspot.com/2gScsRe96d72W6H6rWhRuHrem8ywOPWiKjYnwn6gjpX2NVBW-jgE0KOcL3l1f67kPCT0DvFnSTIO8nOcDORhG4za-aD2hJH54Lp5uu_3PeyQ3Z51HfH05CoMCi0zzZMBXdpu49_uFivC3QHKY_VNnYGjDfIMRF60uHjCPNx85PuHcMLYDr6JmQusl8obKeL01-z49gJmqDjaPaAVvy2cHYP3Qot4HjwL2-tHDPzS4-JSv-uCxtK4OHNLYKlQBfhnyk2v36ZKr3UP89Prcqmn6AXS2ak8IiXBTmaxHMHLsUPvtklRcOa0o6mqcCxPhyAAmdEM3CyZVP5g-9sdqF7mTopHcYfDBIgKxxQS8fnS3HSRBQNX8w-2H4dL6lN2Vp4q2MjPQ5_92aE8BRGjJ8QWNYyQJ79KOaKW95JjRqVoimSMbRA4zYk9c5DfJAVX0Gb_BJEIfwwXNI0SirY-qaXSkbb4ynfGhFlNGcKc_ARdbtxpRDr4uRkwawpP-81ER-72rviwYeYLivpyawu-TYlCdLqI7d-9XE0zd0Q1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff994789758,0x7ff994789768,0x7ff9947897782⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1868,i,5849397025803669155,17646912270049433635,131072 /prefetch:22⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1868,i,5849397025803669155,17646912270049433635,131072 /prefetch:82⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1868,i,5849397025803669155,17646912270049433635,131072 /prefetch:82⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1868,i,5849397025803669155,17646912270049433635,131072 /prefetch:12⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1868,i,5849397025803669155,17646912270049433635,131072 /prefetch:12⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4976 --field-trial-handle=1868,i,5849397025803669155,17646912270049433635,131072 /prefetch:12⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3352 --field-trial-handle=1868,i,5849397025803669155,17646912270049433635,131072 /prefetch:82⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 --field-trial-handle=1868,i,5849397025803669155,17646912270049433635,131072 /prefetch:82⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f9fb8926de5bfb7d28fba6d6b035bf84
SHA189f10096a3ef281a2cb2cbb102b7fe7930494231
SHA25621492ac66df599a6cbc54b1776bbf4528dd9e7dfa92199ba00d2950fc0872b84
SHA512baccf3f78f42c5fefd94dfd4e41fb8a44dbc70b7201ef913f4709197d16af8ebe6ce76b13ad3a7fbe93222a65501d7a0dcca3f2faaf81691c4b002620a9df42d
-
Filesize
1KB
MD5ec174b2832609700fdbecea10658a7af
SHA15c1e15b66c43706963b7864211f1796d1764dbd3
SHA256d17940f067270a634777084412c0a1f94738f10947339c35e5eae378da06c050
SHA51224a6c399d14de7b501f72b305c1a52c2b19159c6557879b53d8b73deabd87d0983387d51220fb2dcb1468a56aad58b7393f61cf2ea4708edab55d4e294a872bb
-
Filesize
6KB
MD5faad246d2be1d57d6834fd2f59533584
SHA17a6738cc29edbe2143480d419cc662f70c74c0c3
SHA256c9d843a6129026cb43938fe74d02627f3ce633b949900acd2c02192cde51cb81
SHA512992b5396ead8e1ed0e0cdfb7d76de6de48e7ec21940aa168ee0a18eae1ac0195eb6d01d1d450b93177e21b640e706c757ef1cc08049947a5071fe3e57fae5d34
-
Filesize
128KB
MD5118f791adb911e571746f059fdcf6e44
SHA17ed61ed35339265d37a66c352b8b0fcbf3e5e0d6
SHA256c73d26c3def3b47813e94e9afb184c93bdd1eed1de762b458c3beeb3958c1aff
SHA512d8c70c27319d00dffa23615365ad23b1fa0c7b21cd366bf4d803b10af67c604b28498f576e21aeda70ffeff1c37051a42a43366d0fd33fbdd3020b04486dd010
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd